Skip to main content
  • Conference proceedings
  • © 2006

Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4301)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Encryption

    1. Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems

      • Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
      Pages 1-18
    2. Efficient Identity-Based Encryption with Tight Security Reduction

      • Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
      Pages 19-36
  3. Key Exchange

    1. A Diffie-Hellman Key Exchange Protocol Without Random Oracles

      • Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
      Pages 37-54
    2. Authenticated Group Key Agreement for Multicast

      • Liming Wang, Chuan-Kun Wu
      Pages 55-72
  4. Authentication and Signatures

    1. Achieving Multicast Stream Authentication Using MDS Codes

      • Christophe Tartary, Huaxiong Wang
      Pages 108-125
  5. Proxy Signatures

    1. Security Model of Proxy-Multi Signature Schemes

      • Feng Cao, Zhenfu Cao
      Pages 144-152
    2. Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque

      • Rongxing Lu, Zhenfu Cao, Xiaolei Dong
      Pages 153-167
  6. Cryptanalysis

    1. Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields

      • Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
      Pages 168-181
    2. Improved Collision Attack on Reduced Round Camellia

      • Guan Jie, Zhang Zhongya
      Pages 182-190
    3. Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks

      • Zbigniew Gołȩbiewski, Mirosław Kutyłowski, Filip Zagórski
      Pages 191-202
  7. Implementation

    1. Bitslice Implementation of AES

      • Chester Rebeiro, David Selvakumar, A. S. L. Devi
      Pages 203-212
  8. Steganalysis and Watermarking

    1. Steganalysis Based on Differential Statistics

      • Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan
      Pages 224-240
    2. Watermarking Essential Data Structures for Copyright Protection

      • Qutaiba Albluwi, Ibrahim Kamel
      Pages 241-258
  9. Boolean Functions and Stream Ciphers

    1. A Note of Perfect Nonlinear Functions

      • Xiyong Zhang, Hua Guo, Jinjiang Yuan
      Pages 259-269
    2. Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing

      • Xiaomin Wang, Jiashu Zhang, Wenfang Zhang
      Pages 270-285

Other Volumes

  1. Cryptology and Network Security

Editors and Affiliations

  • Ecole Normale Supérieure – LIENS/CNRS/INRIA,, France

    David Pointcheval

  • Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Australia

    Yi Mu

  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

    Kefei Chen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access